Feeds

Cutting the cord: future mobile broadband tech

How internet on the go is going to get much faster

Choosing a cloud hosting partner with confidence

Wireless telephony is undergoing a revolution, with technology and implementation philosophy each holding the other back in turn as the industry struggles towards wireless nirvana.

Engineers have spent the last few decades squeezing more data into the same wireless bandwidth, a process that is deep into the realm of diminishing returns. Meanwhile, regulators are loosening rules about what technologies can be deployed by whom, allowing the engineers to exploit new techniques that are defining the standards that will carry the next few decades.

LTE Advance Logo

Mobile telephony was predicated on the ability to make voice calls without wires, but the next generation of wireless standards consider voice calling to be a peripheral function. Instead, data takes central stage. Voice is, after all, just another kind of data. The wireless standards used for telephony today still have a separate channel for voice connections, but LTE (Long-Term Evolution) and WiMax (Worldwide Interoperability for Microwave Access) are both data networks designed to carry broadband data which might incorporate the occasional voice call too - a clear change of focus for the so-called fourth generation (4G) of mobile technologies.

Downloading some history, very slowly

Data was very much an afterthought in the design of the original mobile telephone - the first car phones could be connected to a modem which would squawk down the line at a horribly slow speed. In the UK, tech corporation ICL fitted all its engineers' cars with such modems, and phones to go with them, but it never managed to get a data service working reliably over a network that was ill equipped to handle mission-critical data.

Second-generation technology GSM wasn't a lot better, so wireless data remained something for the desperate specialist despite the launch of Wap (Wireless Application Protocol). Wap promised to deliver the internet on the move, a promise that was made though legendary TV ads that have actually been blamed for killing Wap by setting unrealistic expectations:

There followed a sequence of steps in which the industry repeatedly deluded itself that as soon as data connections could be made slightly faster, users would leap to the wireless internet - and be delighted to pay for it.

Intelligent flash storage arrays

More from The Register

next story
Chipmaker FTDI bricking counterfeit kit
USB-serial imitators whacked by driver update
Xperia Z3: Crikey, Sony – ANOTHER flagship phondleslab?
The Fourth Amendment... and it IS better
Don't wait for that big iPad, order a NEXUS 9 instead, industry little bird says
Google said to debut next big slab, Android L ahead of Apple event
Microsoft to enter the STRUGGLE of the HUMAN WRIST
It's not just a thumb war, it's total digit war
A drone of one's own: Reg buyers' guide for UAV fanciers
Hardware: Check. Software: Huh? Licence: Licence...?
The Apple launch AS IT HAPPENED: Totally SERIOUS coverage, not for haters
Fandroids, Windows Phone fringe-oids – you wouldn't understand
Apple SILENCES Bose, YANKS headphones from stores
The, er, Beats go on after noise-cancelling spat
prev story

Whitepapers

Cloud and hybrid-cloud data protection for VMware
Learn how quick and easy it is to configure backups and perform restores for VMware environments.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Three 1TB solid state scorchers up for grabs
Big SSDs can be expensive but think big and think free because you could be the lucky winner of one of three 1TB Samsung SSD 840 EVO drives that we’re giving away worth over £300 apiece.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.